{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T08:53:04Z","timestamp":1777625584112,"version":"3.51.4"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/tcyb.2013.2245415","type":"journal-article","created":{"date-parts":[[2013,3,25]],"date-time":"2013-03-25T18:00:42Z","timestamp":1364234442000},"page":"2190-2201","source":"Crossref","is-referenced-by-count":55,"title":["LDFT-Based Watermarking Resilient to Local Desynchronization Attacks"],"prefix":"10.1109","volume":"43","author":[{"given":"Huawei","family":"Tian","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yao","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rongrong","family":"Ni","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lunming","family":"Qin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xuelong","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000027790.02288.f2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.870581"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.12.013"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1007\/11551492_32","article-title":"Evaluation of feature extraction techniques for robust watermarking","volume":"1","author":"lee","year":"2005","journal-title":"Proc Int Workshop Digital Watermarking"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008199403446"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.77"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2011.2163817"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1109\/TSMCC.2009.2037512","article-title":"Geometric distortion insensitive image watermarking in affine covariant regions","volume":"40","author":"gao","year":"2010","journal-title":"IEEE Trans Syst Man Cybern C Appl Rev"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908233"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2003.809230"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/3477.809032"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.779264"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2005.46"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1246715"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288897"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/345184"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.918843"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1364\/OE.17.021819"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.877311"},{"key":"ref19","first-page":"49","article-title":"BSP trees","volume":"20","author":"abrash","year":"1995","journal-title":"Dr Dobb s Sourcebook"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809367"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1276109"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.801587"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2003.1236772"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2011.76"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.821622"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1242471.1242473"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1117\/1.3565193"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.113"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/79.879337"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.852474"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.02.009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2042646"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/1360612.1360615","article-title":"Improved seam carving for video retargeting","volume":"27","author":"rubinstein","year":"2008","journal-title":"ACM Trans Graph"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1276377.1276390","article-title":"Seam carving for content-aware image resizing","volume":"26","author":"avidan","year":"2007","journal-title":"ACM Trans Graph"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00012-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2004.840872"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"3740","DOI":"10.1016\/j.patcog.2007.05.004","article-title":"Circularly orthogonal moments for geometrically robust image watermarking","volume":"40","author":"xin","year":"2007","journal-title":"Pattern Recognit"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4408924"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899229"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2004559"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.857263"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00106-5"},{"key":"ref43","first-page":"128","article-title":"Geometrically invariant image watermarking using scale-invariant feature transform and <ref_formula><tex Notation=\"TeX\">$k$<\/tex><\/ref_formula>-means clustering","volume":"1","author":"tian","year":"2010","journal-title":"Proc Int Conf Comput Collect Intell Technol Appl"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/6670128\/06486549.pdf?arnumber=6486549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,12]],"date-time":"2022-02-12T10:37:14Z","timestamp":1644662234000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6486549\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":46,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2013.2245415","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12]]}}}